Many applications provide a services layer (to other applications, to a presentation layer, etc.). Or, they consume services exposed by third-parties (not necessarily trusted). A REST model is a simple, widely-used way for designing such service layers. This ...
Legacy “business-oriented” languages present unique challenges for software security. Unfortunately, there is a lack of awareness about the security risks of these languages. In this post, we will focus on the security vulnerabilities inherent in busin...
As the cybersecurity landscape becomes increasingly complex, it’s essential for organizations to stay informed about the tactics most likely to be used against them. In 2023, SQL injection attacks accounted for 23% of all critical web application vulner...
Not Just a Trend The efficiency of DevOps has proven the staying power of integrating development and deployment departments. It’s now more than just a trendy way of restructuring your workflow; it’s a precedent to which your clients are holding you. If you’r...
Pentesting is also called penetration testing or ethical hacking. A penetration test is designed to answer the question: “How effective is my current security against a skilled human attacker?” In this article, we’ll go over what it is, why it’s important to ...
DIY: Generate OWASP Benchmark Results for Kiuwan Code Security The OWASP Benchmark for Security Automation (OWASP benchmark) is a free and open test suite designed to evaluate the speed, coverage, and accuracy of automated software vulnerability detection too...